Latest Posts

Filter Posts

Clear all filters
Red fist with cascadings numbers.
1 min
3 things activists can do to strengthen their privacy and security
Plummeting press freedoms, stifled internet access, attempts to subvert encryption, and plenty of other indicators point to a budding...
Mohammed Al-Maskati
6 mins
Interview: Meet the person protecting human rights activists amid mass surveillance
Front Line Defenders’s Mohammed Al-Maskati has spent most of his life fighting for human rights in Bahrain and the...
An illustration of a laptop and a pick axe.
4 mins
Cryptojacking: What is it and how do I guard against it?
The term “cryptocurrency,” a combination of “cryptography” and “currency,” alludes to the fact that cryptocurrencies are a form of...
An illustration of a graduate's cap.
3 mins
How technology affects education
Technology in education systems comes with a couple of significant obstacles, but as with previous technologies, also presents some...
A thief attempts to steal a laptop.
5 mins
6 of the biggest crypto heists of all time
When you store your money in a traditional bank, you do so because you have few other options. Of...
Browser with boxes containing different types of browsing activity.
2 mins
You should be compartmentalizing your browsers. Here’s how it works.
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish...
An illustration of a meter. Thumbs up on one end, thumbs down on the other.
4 mins
Your devices are rating you. Behave accordingly.
In a world judged by social media, a low score makes everyday life difficult. You can’t rent a car, book a hotel, or pay for flights.
An illustration of a CA certificate.
3 mins
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to...
Profile of a man whose face has identifiable information about him.
4 mins
Anonymized demographic data can still be used to identify you
If you’re one of the few people who read terms of service, you may find buried in various companies’...
Numerous Bitcoin logos daisy-chained together.
4 mins
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not....
1 min
1 min
Demo Canva and Typeform Shortcode
3 mins
3 mins
4 mins
1 min

Featured Posts

13 mins
3 mins
1 min
2 mins
ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online

This site is registered on wpml.org as a development site.